Publications

Publications

search
in all authortitledescription
categorie
year
 

2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2004 2003 2002 2001 2000 years

Konferenzen

Alexander De Luca, Marian Harbach, Emanuel von Zezschwitz, Max-Emanuel Maurer, Bernhard Slawik, Heinrich Hussmann, Matthew Smith (2014): Now You See Me, Now You Don't - Protecting Smartphone Authentication from Shoulder Surfers, CHI 2014 file

Benjamin Henne, Christian Kater, Matthew Smith(2014): On Usable Location Privacy for Android with Crowd-Recommendations,7th International Conference on Trust and Trustworthy Computing (TRUST'14), LNCS 8564.

Benjamin Henne, Marcel Linke, Matthew Smith(2014): A study on the Unawareness of Shared Photos in Social Network Services,IEEE Security and Privacy Workshop on Web 2.0 Security & Privacy 2014 (W2SP'14). file

Benjamin Henne, Maximilian Koch, Matthew Smith(2014): On the Awareness, Control and Privacy of Shared Photo Metadata,Financial Cryptography and Data Security 2014 (FC'14), LNCS 8437.

Marian Harbach, Emanuel von Zezschwitz, Andreas Fichtner, Alexander De Luca, Matthew Smith (2014): It’s a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception,Symposium on Usable Privacy and Security (SOUPS) file

Marian Harbach, Markus Hettig, Susanne Weber, Matthew Smith (2014): Using Personal Examples to Improve Risk Communication for Security and Privacy Decisions, CHI 2014 file

Marian Harbach, Sascha Fahl, Matthew Smith (2014): Who’s Afraid of Which Bad Wolf? A Survey of IT Security Risk Awareness, Computer Security Foundations Symposium (CSF) file

Benjamin Henne, Christian Kater, Matthew Smith, and Michael Brenner(2013): Selective Cloaking: Need-to-know for Location-based Apps,Privacy, Security and Trust (PST), 2013 Eleventh Annual International Conference on. file

Benjamin Henne, Christian Szongott, Matthew Smith(2013): SnapMe if You Can: Privacy Threats of Other Peoples' Geo-tagged Media and What We Can Do About It,Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2013) file

Benjamin Henne, Marian Harbach, Matthew Smith (2013): Location Privacy Revisited: Factors of Privacy Decisions, CHI '13 Extended Abstracts on Human Factors in Computing Systems file

Benjamin Henne, Matthew Smith(2013): Awareness about photos on the Web and how privacy-privacy-tradeoffs could help,Proceedings of the 2013 International Conference on Financial Cryptography and Data Security (FC13), Workshop on Usable Security (USec13) file

Marian Harbach, Sascha Fahl, Matthias Rieger and Matthew Smith (2013): On the Acceptance of Privacy-Preserving Authentication Technology: The Curious Case of National Identity Cards, Privacy Enhancing Technologies Symposium (PETS) file

Marian Harbach, Sascha Fahl, Polina Yakovleva, and Matthew Smith (2013): Sorry, I Don’t Get It: An Analysis of Warning Message Texts,17th International Conference on Financial Cryptography and Data Security, USEC Workshop file

Markus Hettig, Eugen Kiss, Jan-Frederik Kassel, Susanne Weber, Marian Harbach, Matthew Smith (2013): Visualizing Risk by Example: Demonstrating Threats Arising From Android Apps, Workshop on Risk Perception in IT Security and Privacy, SOUPS 2013 file

Michael Brenner and Matthew Smith(2013): Poster: Caching Oblivious Memory Access - An Extension to the HCRYPT Virtual Machine,Proceedings of the 20th ACM Conference on Computer and Communications Security (ACM CCS 2013), ISBN 978-1-4503-2477-9/13/11, pp. 1363-1365 file

Sascha Fahl, Marian Harbach, Henning Perl, Markus Koetter, Matthew Smith(2013): Rethinking SSL Development in an Appified World,Proceedings of the 20th ACM Conference on Computer and Communications Security (ACM CCS 2013) Datei

Sascha Fahl, Marian Harbach, Marten Oltrogge, Thomas Muders and Matthew Smith (2013): Hey, You, Get Off of My Clipboard - On How Usability Trumps Security in Android Password Managers,Financial Cryptography and Data Security, Springer Lecture Notes in Computer Science, to appear

Sascha Fahl, Marian Harbach, Yasemin Acar, Matthew Smith(2013): On the Ecological Validity of a Password Study,Ninth Symposium On Usable Privacy and Security (SOUPS 2013)

Benjamin Henne, Christian Szongott, Matthew Smith(2012): Coupled Multi-Agent Simulations for Mobile Security & Privacy Research,Proceedings of the 6th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2012) file

Christian Szongott, Benjamin Henne, Matthew Smith(2012): Evaluating the threat of epidemic mobile malware,Proceedings of the 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2012) file

Christian Szongott, Benjamin Henne, Matthew Smith(2012): Mobile Evil Twin Malnets - The Worst of Both Worlds,Proceedings of the 11th International Conference on Cryptology and Network Security (CANS 2012) file

Henning Perl, Yassene Mohammed, Michael Brenner, Matthew Smith(2012): Fast Confidential Search for Bio-Medical Data Using Bloom Filters and Homomorphic Cryptography,Proceedings of the 8th IEEE International Conference on eScience (eScience 2012), ISBN 978-1-4673-4467-8, pp. 1-8

Marian Harbach, Sascha Fahl, Michael Brenner, Thomas Muders and Matthew Smith (2012): Towards Privacy-Preserving Access Control with Hidden Policies, Hidden Credentials and Hidden Decisions, Proceedings of Tenth Annual Conference on Privacy, Security and Trust (PST 2012) file

Marian Harbach, Sascha Fahl, Thomas Muders, Matthew Smith(2012): All Our Messages Are Belong to Us: Usable Confidentiality in Social Networks,Proceedings of the World Wide Web Conference (WWW 2012), Poster file

Marian Harbach, Sascha Fahl, Thomas Muders, Matthew Smith(2012): Towards Measuring Warning Readability,Eighth Symposium On Usable Privacy and Security (SOUPS 2012), Poster file

Matthew Smith, Benjamin Henne, Christian Szongott, Gabriele von Voigt(2012): Big Data Privacy Issues in Public Social Media,Proceedings of the 6th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2012) file

Michael Brenner, Henning Perl, Matthew Smith(2012): How Practical is Homomorphically Encrypted Program Execution? An Implementation and Performance Evaluation,11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012), ISBN 978-0-7695-4745-9/12, pp. 375-382 file

Michael Brenner, Henning Perl, Matthew Smith(2012): Practical Applications of Homomorphic Encryption,Proceedings of the 7th International Conference on Security and Cryptography (SECRYPT 2012), ISBN 978-989-8565-24-2, pp. 5-14 file

Mustafa Sofean and Matthew Smith(2012): A Real-Time Architecture for Detection of Diseases using Social Networks: Design, Implementation and Evaluation. (poster) ,Proceedings of the ACM Conference on Hypertext and Hypermedia (HT 2012)

Mustafa Sofean and Matthew Smith(2012): A Real-Time Disease Surveillance Architecture Using Social Networks,Proceedings of the 24th European Medical Informatics Conference (MIE 2012)

Mustafa Sofean, Kerstin Denecke, Avaré Stewart, Matthew Smith(2012): Medical Case-Driven Classification of Microblogs: Characteristics and Annotation,ACM SIGHIT International Health Informatics Symposium (IHI 2012)

N. gentschen Felde, W. Hommel, H. Reiser, F. von Eye, J. Kohlrausch, C. Szongott(2012): A Grid–based Intrusion Detection System (GIDS),18th EUNIS Congress, 2012, Poster, University of Trás–os–Montes e Alto Douro, Vila Real, Portugal

N. gentschen Felde, W. Hommel, H. Reiser, F. von Eye, J. Kohlrausch, C. Szongott(2012): Das Datenschutzkonzept für das föderierte Frühwarnsystem im D–Grid und seine technische Umsetzung,GI–Edition – Lecture Notes in Informatics (LNI): Proceedings; 5. DFN–Forum Kommunikationstechnologien – Beiträge der Fachtagung

Sascha Fahl, Marian Harbach, Matthew Smith(2012): Towards Human-Centric Visual Access Control for Clinical Data Management,Proceedings of the 24th European Medical Informatics Conference (MIE 2012)

Sascha Fahl, Marian Harbach, Matthew Smith(2012): Human-Centric Visual Access Control for Clinical Data Management,Proceedings of the IEEE International Conference on Digital Ecosystems and Technologies

Sascha Fahl, Marian Harbach, Thomas Muders and Matthew Smith(2012): TrustSplit: Usable Confidentiality for Social Network Messaging,Proceedings of the ACM Conference on Hypertext and Hypermedia (HT 2012)

Sascha Fahl, Marian Harbach, Thomas Muders, Lars Baumgärtner, Bernd Freisleben and Matthew Smith(2012): Why Eve and Mallory Love Android: An Analysis of Android SSL (In)Security,Proceedings of the 19th ACM Conference on Computer and Communications Security (ACM CCS 2012), to appear file

Sascha Fahl, Marian Harbach, Thomas Muders, Matthew Smith(2012): Confidentiality as a Service - Usable Security for the Cloud,11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012)

Sascha Fahl, Marian Harbach, Thomas Muders, Uwe Sander and Matthew Smith(2012): Helping Johnny 2.0 to Encrypt His Facebook Conversations,Eighth Symposium On Usable Privacy and Security (SOUPS 2012) file

Avaré Stewart, Matthew Smith, Wolfgang Nejdl(2011): A transfer approach to detecting disease reporting events in blog social media,Proceedings of the 22nd ACM conference on Hypertext and hypermedia

Benjamin Henne, Christian Szongott, Matthew Smith(2011): Towards a Mobile Security & Privacy Simulator,Proceedings of the 2011 IEEE Conference on Open Systems (ICOS2011) file

Christopher Kunz, Ninah Tahmasebi, Thomas Risse, Matthew Smith(2011): Detecting Credential Abuse in the Grid using Bayesian Networks,Proceedings of the 12th IEEE/ACM Conference on Grid Computing file

Henning Perl, Michael Brenner, Matthew Smith(2011): Poster: An Implementation of the Fully Homomorphic Smart-Vercauteren Crypto-System,Proceedings of the 18th ACM Conference on Computer and Communications Security (ACM CCS 2011), ISBN 978-1-4503-0948-6, pp. 837-840 file

Marian Harbach and Matthew Smith(2011): Visual Access Control for Research Ecosystems,Proceedings of the 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011), pp. 101-108 file

Matthew Smith, Marian Harbach, Susanne Mertins, Andrew Lewis and Lyn Griffiths(2011): (IEEE Best Paper Award) Towards a Translational Medical Research Ecosystem,Proceedings of the 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011), pp. 120-126 file

Michael Brenner, Jan Wiebelitz, Gabriele von Voigt, Matthew Smith(2011): Secret Program Execution in the Cloud applying Homomorphic Encryption,Proceedings of the 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011), ISBN:978-1-4577-0871-8, pp. 114-119 file

Michael Brenner, Jan Wiebelitz, Gabriele von Voigt, Matthew Smith(2011): A Smart-Gentry based Software System for Secret Program Execution,Proceedings of the 6th International Conference on Security and Cryptography (SECRYPT 2011), ISBN 978-989-8425-71-3, pp. 238-244 file

Shayan Shahand, Mark Santcroos, Yassene Mohammed, Vladimir Korkhov, Angela C. M. Luyf, Antoine H. C. van Kampen, Silvia D. Olabarriage(2011): Front-ends to Biomedical Data Analysis on Grids,Healthgrid 2011

Yassene Mohammed, Shayan Shahand, Vladimir Korkhov, Angela C.M. Luyf, Barbera D.C. van Schaik, Matthan W.A. Caan, Antoine H.C. van Kampen, Magnus Palmblad, Silvia .D. Olabarriaga(2011): Data Decomposition in Biomedical e-Science Applications,eScience Workshops, 2011 IEEE Seventh International Conference on eSciecne

Christian Schridde, Tim Dörnemann, Ernst Juhnke, Matthew Smith, Bernd Freisleben (2010): An Identity-Based Security Infrastructure for Cloud Environments,Proceedings of IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS2010)

Christopher Kunz, Jan Wiebelitz, Matthew Smith(2010): An attack-resilient Grid auditing infrastructure,Proceedings of the IEEE WCNIS 2010 file IEEE WCNIS 2010 25.-27.06.2010

M. Schmidt, N. Fallenbeck, M. Smith, B. Freisleben(2010): Efficient Distribution of Virtual Machines for Cloud Computing,Proceedings of the 18th Euromicro Conference on Parallel, Distributed and Network-based Processing (PDP 2010), pp. (to appear), IEEE Press, 2010 file 17.02.2010-19.02.2010

Marian Harbach, Tim Dörnemann, Ernst Juhnke and Bernd Freisleben(2010): Semantic Validation of BPEL Fragment Compositions,4th IEEE International Conference on Semantic Computing (ICSC), pp.176-183 file

Michael Brenner, Jan Wiebelitz, Matthew Smith(2010): A JEE-based Architecture for Distributed Multi-Domain Resource Accounting,2010 Sixth IEEE International Conference on eScience Workshops, ISBN:978-0-7695-4295-9/10, pp. 31-38 file

Mohammed Y, Dickmann F, Sax U, von Voigt G, Smith M, Rienhoff O.(2010): Reaching for the Cloud: On the Lessons Learned from Grid Computing Technology Transfer Process to the Biomedical Community ,Medinfo 2010, Stud Health Technol Inform. 2010;160(Pt 2):1339-43. Medinfo 2010

Mohammed Y, Sax U, Dickmann F, Lippert J, Solodenko J, von Voigt G, Smith M, Rienhoff O.(2010): On transferring the grid technology to the biomedical community,HealthGrid 2010, Stud Health Technol Inform. 2010;159:28-39. HealthGrid2010

T. Stadelmann, Y. Wang, Matthew Smith, Ralph Ewerth, Bernd Freisleben (2010): Rethinking Algorithm Design and Development in Speech Processing ,Proceedings of 20th International Conference on Pattern Recognition

Tolga Dalman, Tim Dörnemann, Ernst Juhnke, Michael Weitzel, Matthew Smith, Wolfgang Wiechert, Katharina Nöh, Bernd Freisleben (2010): Metabolic Flux Analysis in the Cloud ,Proceedings of IEEE Conference on eScience

Wiebelitz, J., Brenner, M., Kunz, C., Smith, M.(2010): Early Defense - Enabling Attribute-Based Authorization in Grid Firewalls,Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing, ISBN:978-1-60558-942-8, pp. 336-339 HPDC 2010 22.06-25.06.2010

C. Kunz, J. Wiebelitz, S. Piger, C. Grimm(2009): A Concept for Grid Credential Lifecycle Management and Heuristic Credential Abuse Detection,Proc. of the 5th International Conference on Networking and Services (ICNS 2009) ICNS 2009 20.04.2009 - 24.04.2009

C. Kunz, J. Wiebelitz, S. Piger, C. Grimm(2009): A Concept for Grid Credential Lifecycle Management and Heuristic Credential Abuse Detection,Proc. of the 8th International Symposium on Parallel and Distributed Computing (ISPDC '09) ISPDC 2009

C. Schridde, M. Smith, B. Freisleben(2009): TrueIP: Prevention of IP Spoofing Attacks Using Identity-Based Cryptography,pp. 128-137, ACM Press, 2009 2nd International Conference on Security of Information and Networks, SIN2009 6.-10.10.2009

Dickmann, F., Kaspar, M., Löhnhardt, B., Kepper, N., Viezens, F., Hertel, F., Lesnussa, M., Mohammed, Y., Thiel, A., Steinke, T., Bernarding, J., Krefting, D., Knoch, T.A., and Sax, U. (2009): Visualization in Health Grid Environments: A Novel Service and Business Approach. , The 6th International Workshop on Grid Economics and Business Models, GECON 2009. Delft, The Netherlands. 2009

J. Wiebelitz, C. Kunz, S. Piger, C. Grimm(2009): TCP-AuthN: TCP Inline Authentication to Enhance Network Security in Grid Environments,Proc. of the 8th International Symposium on Parallel and Distributed Computing ISPDC 2009

J. Wiebelitz, C. Kunz, S. Piger, C. Grimm(2009): TCP-AuthN: An Approach to Dynamic Firewall Operation in Grid Environments,Proc. of the 5th International Conference on Networking and Services ICNS 2009 April 2009

J. Wiebelitz, S. Piger, C. Kunz, C. Grimm(2009): Transparent Identity-based Firewall Transition for eScience,Proc. of the 2009 5th IEEE International Conference on eScience Workshops e-Science 2009 09. - 13.12.2009

Kunz, C.; Szongott, C.; Wiebelitz, J.; Grimm, C.(2009): Design and Implementation of a Grid Proxy Auditing Infrastructure,Proc. of the 2009 5th IEEE International Conference on eScience Workshops 5th IEEE International Conference on E-Science Workshops 12/2009

M. Schmidt, N. Fallenbeck, M. Smith, B. Freisleben(2009): Secure Service-Oriented Grid Computing with Public Virtual Worker Nodes,Proceedings, pp. 555-562, IEEE press, 2009 file 35th EUROMICRO CONFERENCE on Internet technologies, quality of service and applications (ITQSA) 27.-29.8.2009

M. Smith, C. Schridde, B. Agel, B. Freisleben(2009): Identity-based Cryptography for Securing Mobile Phone Calls,Workshops Proceedings, Pages 365-370 file 23rd International Conference on Advanced Information Networking and Applications, AINA 2009, Bradford, United Kingdom, 26.05.2009-29.05.2009

M. Smith, C. Schridde, B. Agel, B. Freisleben(2009): Securing Mobile Phone Calls with Identity-Based Cryptography,pp. 210-222, Springer Verlag, 2009 file The 3rd International Conference on Information Security and Assuranc 25.-27.6.2009

M. Smith, F. Schwarzer, M. Harbach, T. Noll, B. Freisleben(2009): A Streaming Intrusion Detection System for Grid Computing Environments,pp. 44-51, IEEE press, 2009 file The 11th IEEE International Conference on High Performance Computing and Communications 25.-27.6.2009

R. Groeper, C. Kunz, C. Grimm(2009): Connecting OGC Web Services and the Grid using Globus Toolkit 4 and OGSA-DAI,Proc. of the 10th IEEE / ACM International Conference on Grid Computing (Grid2009) 10th IEEE / ACM International Conference on Grid Computing (Grid2009) 13. - 15. August 2009

C. Schridde, M. Smith, B. Freisleben(2008): An Identity-Based Key Agreement Protocol for the Network Layer,pp. 409-422, Lecture Notes in Computer Science, Springer-Verlag, 2008 file 6th Conference on Security and Cryptography for Networks, Amalfi, Italy 10.-12.9.2008

I. Scriven, A. Lewis, M. Smith, T. Friese(2008): Resource Evaluation and Node Monitoring in Service Oriented Ad-hoc Grids,pp. 65-71, Australian Computer Society Inc., 2008 Sixth Australasian Symposium on Grid Computing and e-Research (AusGrid 2008) 24.1.2008

J. Wiebelitz, S. Dal Pra, W. Müller, G. von Voigt(2008): The German Grid Initiative: A Uniform Accounting Service in Multiple Middleware Environments, The 5th International Workshop on Grid Economics and Business Models (GECON 2008), Las Palmas August 2008

J. Wiebelitz, W. Müller, M. Brenner, G. von Voigt(2008): Towards a Comprehensive Accounting Solution in the Multi-Middleware Environment of the D-Grid Initiative, Proc. Cracow Grid Workshop '08, Krakau Oktober 2008

M. Smith, C. Schridde, B. Freisleben(2008): Securing Stateful Grid Servers through Virtual Server Rotation,Proceedings, pp. 11-23, ACM Press, 2008 file ACM/IEEE International Symposium on High Performance Distributed Computing (HPDC) 23.-27.6.2008

S. Piger, C. Grimm, R. Groeper, C. Kunz(2008): A Comprehensive Approach to Self-Restricted Delegation of Rights in Grids,Proc. Eigth IEEE International Symposium on Cluster Computing and the Grid 2008 (CCGrid2008), Lyon Eigth IEEE International Symposium on Cluster Computing and the Grid 2008 (CCGrid2008), Lyon Mai 2008

S. Piger, C.Kunz, C. Grimm, R. Groeper(2008): Enhancing Security in Grids through Self-Restricted Delegation of Rights with User-based Policies,Proc. of the Parallel and Distributed Computing and Networks (PDCN 2008), Innsbruck Parallel and Distributed Computing and Networks (PDCN 2008), Innsbruck Februar 2008

T. Dörnemann, M. Smith, B. Freisleben(2008): Composition and Execution of Secure Workflows in WSRF-Grids,Proceedings, pp. 122-129, IEEE Press, 2008 file 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid '08) 19.-22.5.2008

T. Dörnemann, M. Smith, E. Juhnke, B. Freisleben(2008): Secure Grid Micro-Workflows Using Virtual Workspaces,Proceedings, pp. 119-126, IEEE Press, 2008 file 34th EUROMICRO CONFERENCE on Software Engineering and Advanced Applications (SEAA) 3.-5.9.2008

C. Grimm, R. Groeper, S. Makedanz, H. Pfeiffenberger, P. Gietz, M. Haase, M. Schiffers, W. Ziegler(2007): Trust Issues in Shibboleth-Enabled Federated Grid Authentication and Authorization Infrastructures Supporting Multiple Grid Middleware,Proceedings of the Third IEEE International Conference on e-Science and Grid Computing Third IEEE International Conference on e-Science and Grid Computing, Bangalore, India 10-13 December 2007

C. Schridde, H.J. Picht, M. Heidt, M. Smith, B. Freisleben(2007): Secure Integration of Desktop Grids and Compute Clusters Based on Virtualization and Meta-Scheduling,Proceedings of the German e-Science Conference, 2007 German e-Science Conference 2007 2.-4.5.2007

Kottha, S., Peter, K., Steinke, T., Bart, J., Falkner, J., Weisbecker, A., Viezens, F., Mohammed, Y., Sax, U., Hoheisel, A., Ernst, T., Sommerfeld, D., Krefting, D., and Vossberg, M.(2007): Medical Image Processing in MediGRID.,Max Planck Digital Library. in German e-Science Conference.

M. Schmidt, M. Smith, N. Fallenbeck, H.J. Picht, B. Freisleben(2007): Building a Demilitarized Zone with Data Encryption for Grid Environments,Proceedings, pp. 8-16, 2007 file First International Conference on Networks for Grid Applications 17.-19.10.2007

M. Smith, M. Schmidt, N. Fallenbeck, C. Schridde, B. Freisleben(2007): Optimising Security Configurations with Service Level Agreements,Proceedings, pp. 367-381, 2007 file Proceedings of the 7th International Conference on Optimization: Techniques and Applications (ICOTA '07) 12.-15.12.2007

Mohammed, Y., Rey, S., Rakebrandt, F., and Sax, U. (2007): The integration of grid resources into a portal for research collaboratories. ,in Medinfo 12 (Pt 1). Medinfo

Mohammed, Y., Sax, U., Viezens, F., and Rienhoff, O. (2007): Shortcomings of current grid middlewares regarding privacy in HealthGrids.,Studies in Health Technology and Informatics 126.

R. Groeper, C. Grimm, S. Piger, J. Wiebelitz(2007): An Architecture for Authorization in Grids using Shibboleth and VOMS,Proc. of the 33rd Euromicro Conference on Software Engineering and Advanced Applications (SEAA), Lübeck, Germany, August 2007. 33rd Euromicro Conference on Software Engineering and Advanced Applications (SEAA) 27-31 August 2007

T. Barth, K. Dörnemann, T. Dörnemann, B. Freisleben, T. Friese, M. Grauer, J. Jakumeit, J. Reichwald, C. Schridde, M. Smith, F. Thilo(2007): Supporting Engineering Processes Utilizing Service-Oriented Grid Technology,Proceedings, pp. 1-10, 2007 file German e-Science Conference 2007 2.-4.5.2007

T. Dörnemann, S. Heinzl, K. Dörnemann, M. Mathes, M. Smith, B. Freisleben(2007): Secure Grid Service Engineering for Industrial Optimization,Proceedings, pp. 371-372, 2007 file 7th International Conference on Optimization: Techniques and Applications (ICOTA) 12.-15.12.2007

T. Friese, M. Smith, B. Freisleben(2007): Native Code Security for Grid Services,Proceedings, pp. 513-530, 2007 file WI 2007 28.2.-3.2.2007

C. Grimm, S. Piger, J. Wiebelitz(2006): Evaluation von Security-Mechanismen in Grid-Umgebungen,Proc. 20. DFN-Arbeitstagung über Kommunikationsnetze, Heilbronn, Juni 2006

J. Jakumeit, T. Barth, J. Reichwald, M. Grauer, F. Thilo, T. Friese, M. Smith, B. Freisleben(2006): A Grid-Based Parallel Optimization Algorithm Applied to a Problem in Metal Casting Industry,Proceedings, pp. 213- 213, IEEE Press, 2006 2nd International Conference on Bioinspired Optimization Methods and their Applications 9.-10.10.2006

J. Zhang, N. Borisov, W. Yurcik, A. Slagell, M. Smith(2006): Future Internet Security Services Enabled by Sharing of Anonymized Logs,pp. (to appear), 2006 file International Conference on Emerging Trends in Information and Communication Security, Workshop on Security and Privacy in Future Business Services 6.-9.6.2006

M. Smith, B. Klose, R. Ewerth, T. Friese, M. Engel, B. Freisleben(2006): Runtime Integration of Reconfigurable Hardware in Service-Oriented Grids,Proceedings, pp. 945-948, IEEE Press, 2006 IEEE International Conference on Web Services (ICWS), Chicago, USA 9.-13.7.2006

M. Smith, M. Engel, S. Hanemann, B. Freisleben(2006): Towards a Roadcasting Communications Infrastructure,Proceedings, pp. 213- 213, IEEE Press, 2006 file IEEE International Conference on Mobile Communications and Learning Technologies 14.-16.3.2006

M. Smith, T. Friese, B. Freisleben(2006): Model Driven Development of Service-Oriented Grid Applications,Proceedings, pp. 139-146, IEEE Press, 2006 file International Conference on Internet and Web Applications and Services, Guadeloupe 23.-25.2.2006

M. Smith, T. Friese, M. Engel, B. Freisleben, G. Koenig, W. Yurcik(2006): Security Issues in On-Demand Grid and Cluster Computing,Proceedings, pp. 14-24, IEEE Press, 2006 file Sixth IEEE International Symposium on Cluster Computing and the Grid Workshops (CCGRID 06) 16.-19.5.2006

N. Fallenbeck, H. Picht, M. Smith, B. Freisleben(2006): Xen and the Art of Cluster Scheduling,Proceedings, pp. 4-11, IEEE Press, 2006 file VTDC '06: 2nd International Workshop on Virtualization Technology in Distributed Computing in conjuncture with the ACM/IEEE conference on Supercomputing 11.-17.11.2006

S. Heinzl, M. Mathes, T. Friese, M. Smith, B. Freisleben(2006): Flex-SwA: Flexible Exchange of Binary Data Based on SOAP Messages with Attachments,Proceedings, pp. 3-10, IEEE Computer Society Press, 2006 file IEEE International Conference on Web Services (ICWS) 28.-22.9.2006

S. Piger, C. Grimm, J. Wiebelitz, R. Groeper(2006): An Approach to Restricted Delegation of User Rights based on the gLite Middleware,Proc. Cracow Grid Workshop 06, Krakau, Polen, Oktober 2006.

S. Rieger, B. Gersbeck-Schierholz, J. Mönnich, J. Wiebelitz(2006): Self-Service PKI-Lösungen for eScience,Proc. 13. DFN Workshop "Sicherheit in vernetzten Systemen", Hamburg, März 2006.

T. Friese, M. Smith, B. Freisleben(2006): Grid Development Tools for Eclipse, file Eclipse Technology eXchange workshop (eTX) at ECOOP, 2006 4.7.2006

T. Friese, M. Smith, B. Freisleben(2006): GDT: A Toolkit for Grid Service Development,Proceedings, pp. 131-148, 2006 file 3rd International Conference on Grid Service Engineering and Management 18.-21.9.2006

T. Friese, M. Smith, B. Freisleben, J. Reichwald, T. Barth, M. Grauer(2006): Collaborative Grid Process Creation Support in an Engineering Domain,Proceedings, pp. 263-276, Springer , 2006 file International Conference on High Performance Computing 13.-15.9.2006

C. Grimm, J. Wiebelitz, S. Piger, D. Goehr(2005): Betrieb sicherer Netzinfrastrukturen für Grid-Umgebungen,19. DFN-Arbeitstagung über Kommunikationsnetze, Düsseldorf, Mai 2005. In: GI-Edition „Lecture Notes in Informatics“ (LNI), P-73, S. 289–303, Köllen Verlag, Bonn, 2005.

E. Papalilo, T. Friese, M. Smith, B. Freisleben(2005): Trust Shaping: Adapting Trust Establishment and Management to Application Requirements in a Service-Oriented Grid Environment,Proceedings, pp. 47-58, LNCS 3795, Springer-Verlag, 2005 4th International Conference on Grid and Cooperative Computing (GCC), Beijing, China 30.11.-3.12.2005

Koch, A., Sassenberg, W., Sandhagen, C., Hentsche, W., and Mohammed, Y.(2005): Photoakustischer Rußsensor mit kurzer Reaktionszeit. ,in 69th Annual Meeting of the Deutsche Physikalische Gesellschaft (DPG) "Physik seit Einstein", Berlin. 69th Annual Meeting of the Deutsche Physikalische Gesellschaft (DPG).

M. Smith, S. Hanemann, B. Freisleben(2005): Coupled Simulation/Emulation for Cross-Layer Enabled Mobile Wireless Computing,Proceedings, pp. 375-383, Springer-Verlag, 2005 Second International Conference on Embedded Software and Systems, Xian, China 16.-18.12.2005

M. Smith, T. Friese, B. Freisleben(2005): Intra-Engine Service Security for Grids Based on WSRF,Proceedings, pp. 644-653, IEEE Press, 2005 file 2005 IEEE/ACM International Sysmposium on Cluster Computing and Grid (CCGRID'05), Cardiff, UK 9.-12.5.2005

O. Battenfeld, M. Smith, P. Reinhardt, T. Friese, B. Freisleben(2005): A Modular Routing Architecture for Hot Swappable Mobile Ad hoc Routing Algorithms,Proceedings, pp. 359-366, Springer-Verlag, 2005 Second International Conference on Embedded Software and Systems, Xian, China 16.-18.12.2005

T. Friese, , M. Smith, B. Freisleben(2005): A Robust Business Resource Management Framework Based on a Peer-to-Peer Infrastructure,Proceedings, pp. 215-222, IEEE Press, 2005 7th International IEEE Conference on E-Commerce Technology, Munich, Germany 19.-22.7.2005

D. Goehr, C. Grimm, N. Jensen, S. Piger, et al.(2004): A Novel Approach to Protect Grids with Firewalls,4th Cracow Grid Workshop 2004, Krakau, Dezember 2004.

Koch, A., Sandhagen, C., Sassenberg, W., and Mohammed, Y. (2004): Photoakustischer Rußsensor mit kurzer Reaktionszeit. ,in 4th Conference on Optical Analysis Technology, Düsseldorf, VDI-Berichte Nr. 1863.

M. Engel, B. Freisleben, M. Smith, S. Hanemann(2004): Wireless Ad-Hoc Network Emulation Using Microkernel-Based Virtual Linux Systems,Proceedings, pp. 198-203, EUROSIM Publishers, 2004 file 5th EUROSIM Congress on Modeling and Simulation, Marne la Vallee, France 6.-10.9.2004

M. Smith, B. Freisleben(2004): Self-Healing Wireless Ad Hoc Networks Based On Adaptive Node Mobility,Proceedings, pp. 121-124, IFIP, 2004 file the First IFIP International Conference on Wireless and Optical Communications Networks, Muscat, Oman 7.-10.6.2004

M. Smith, T. Friese, B. Freisleben(2004): Towards a Service-Oriented Ad Hoc Grid,Proceedings, pp. 201-208, IEEE Press, 2004 file 3rd International Symposium on Parallel and Distributed Computing, Cork, Ireland 5.-7.7.2004

T. Friese, M. Smith, B. Freisleben(2004): Hot Service Deployment in an Ad Hoc Grid Environment,Proceedings, pp. 75-83, ACM Press, 2004 file 2nd Int. Conference on Service-Oriented Computing (ICSOC'04), New York, USA 15.-18.11.2004

Verhey, J.F., Mohammed, Y., Giese, K., and Ludwig, A. (2003): A practical FEM-model for light and heat distribution using laser induced thermotherapy (LITT) in neck surgery. ,Minimally Invasive Therapy & Allied Technologies 12, 178.

C. Grimm, D. Goehr, S. Piger(2002): Aspekte standortübergreifender mobiler Kommunikationsinfrastrukturen,In S. Schubert, B. Reusch, N. Jesse (Hrsg.). Informatik bewegt. Proc. 32. GI-Jahrestagung, S. 518–522, Dortmund, Oktober 2002.

Journale

Henning Perl, Yassene Mohammed, Michael Brenner, Matthew Smith(2013): Privacy/performance trade-off in private search on bio-medical data,Elsevier Future Generation Computer Systems (ISSN 0167-739X)

Matthew Smith, Christian Schridde, B. Agel, Bernd Freisleben (2010): Secure Mobile Communication via Identity-based Cryptography and Server-aided Computations ,Journal of Supercomputing

Krefting, D., Bart, J., Beronov, K., Dzhimova, O., Falkner, J., Hartung, M., Hoheisel, A., Knoch, T.A., Lingner, T., Mohammed, Y., Peter, K., Rahm, E., Sax, U., Sommerfeld, D., Steinke, T., Tolxdorff, T., Viezens, F., Vossberg, M., Weisbecker, A. (2009): MediGRID: Towards a User Friendly Secured Grid Infrastructure.,Future Generation Computer Systems, 2009, 25(3), p. 326-336.

R. Groeper, C. Grimm, S. Makedanz, H. Pfeiffenberger, W. Ziegler, P. Gietz, M. Schiffers(2009): A Concept for Attribute-Based Authorization on D-Grid Resources,The International Journal of Grid Computing: Theory, Methods and Applications, Vol. 25, Nr. 3, S. 275–280, März 2009, Elsevier

F. Dickmann, Y. Mohammed, R. Munzel, S. Rey, O. Rienhoff(2008): IT- und Prozessdokumentation im klinischen Umfeld,mdi - Forum der Medizin Dokumentation und Medizin Informatik.

Krefting, D., Bart, J., Beronov, K., Dzhimova, O., Falkner, J., Hartung, M., Hoheisel, A., Knoch, T.A., Lingner, T., Mohammed, Y., Peter, K., Rahm, E., Sax, U., Sommerfeld, D., Steinke, T., Tolxdorff, T., Viezens, F., Vossberg, M., and Weisbecker, A.(2008): MediGRID: Towards a User Friendly Secured Grid Infrastructure,Future Generation Computer Systems, 25 (3).

M. Smith, M. Schmidt, N. Fallenbeck, T. Dörnemann, C. Schridde, B. Freisleben(2008): Secure On-Demand Grid Computing,Journal of Future Generation Computer Systems, pp. 315-325, Elsevier, 2008

S. Canisius, T. Ploch, K Kesper, M. Smith, B. Freisleben, T. Penzel(2007): Sleep medicine as a scenario for medical grid application,Studies in health technology and informatics, pp. 37-46, IOS Press, 2007 file

M. Smith, T. Friese, M. Engel, B. Freisleben(2006): Countering Security Threats in Service-Oriented On-Demand Grid Computing Using Sandboxing and Trusted Computing Techniques,Journal of Parallel and Distributed Computing, Volume 66, Issue 9, pp. 1189-1204, Elsevier, 2006 file

Mohammed, Y., and Verhey, J.F.(2005): A finite element method model to simulate laser interstitial thermotherapy in anatomical inhomogeneous regions.,BioMedical Engineering OnLine 2005, 4:2.

Verhey, J.F., Mohammed, Y., Ludwig, A., and Giese, K.(2003): Implementation of a practical model for light and heat distribution using laser-induced thermotherapy near to a large vessel.,Physics in medicine and biology 48(21).

Zeitschriftenartikel

Michael Brenner(2013): Geheimes Rechnen - Homomorphe Kryptosysteme: Algebra mit verschlüsselten Zahlen,iX Magazin für professionelle Informationstechnik (ISSN 0935-9680) Ausgabe 7/2013, S. 115-118, heise Verlag

Michael Brenner(2012): Geheimnisträger - Vertrauliche Datenverarbeitung mit homomorpher Kryptografie,iX Magazin für professionelle Informationstechnik (ISSN 0935-9680) Ausgabe 6/2012, S. 120-124, heise Verlag

Michael Brenner(2012): Vertrauliche Datenverarbeitung in der Cloud - Wie schützt man Programme und Daten in verteilten Systemen?,Unimagazin (ISSN 1616-4075) Ausgabe 1/2 2012 "Future Internet", Leibniz Universität Hannover

Bücher und Buchbeiträge

Rainer Böhme, Michael Brenner, Tyler Moore and Matthew Smith (Eds.)(2014): 18th International Conference on Financial Cryptography and Data Security, Proceedings of the FC 2014 Workshops BITCOIN and WAHC,Springer Lecture Notes in Computer Science, LNCS Volume 8438, ISBN 978-3-662-44774-1 (online) / 44773-4 (print)

Andrew A. Adams, Michael Brenner, Matthew Smith (Eds.)(2013): 17th International Conference on Financial Cryptography and Data Security, Proceedings of the FC 2013 Workshops USEC and WAHC,Springer Lecture Notes in Computer Science, LNCS Volume 7862, ISBN 978-3-642-41319-3 (print) / 41320-9 (online)

N. gentschen Felde, W. Hommel, J. Kohlrausch, J. Köcher, C. Szongott, F. von Eye(2011): Ein föderiertes Intrusion Detection System für das D-Grid,Paulsen, Christian (Herausgeber): Sicherheit in vernetzten Systemen: 18. DFN Workshop

Mohammed, Y., Viezens, F., Dickmann, F., Falkner, J., Lingner, T., Krefting, D., Sax, U.(2009): Data Protection and Data Security Regarding Grid Computing in Biomedical Research. ,Cannataro, M. ed. Handbook of Research on Computational Grid Technologies for Life Sciences, Biomedicine and Healthcare, Medical Information Science Reference: Hershey, PA, 2009, p.76-89.

Legré, Y., Mohammed, Y., Viezens, F., Rienhoff, O., and Sax, U.(2007): HealthGRID/ SHARE: Grids for Health - International Interoperability.,in eHealth Conference 2007 - Experts' Special Interest Sessions, nanos Verlag oHG, Bonn, 2008. in eHealth Conference 2007 - Experts' Special Interest Sessions.

Sax, U., Weisbecker, A., Falkner, J., Viezens, F., Mohammed, Y., Hartung, M., Bart, J., Krefting, D., Knoch, T.A., and Semler, S.C.(2007): Auf dem Weg zur individualisierten Medizin - Grid-basierte Services für die Elektronische Patientenakte der Zukunft.,in Jäckel, A. ed. Telemedizinführer Deutschland 2008, Medizin Forum AG, Bad Nauheim.

Drepper, J., Semler, S.C., Mohammed, Y., and Sax, U.(2006): Aktuelle Themen des Datenschutzes und der Datensicherheit in der biomedizinischen Forschung.,in Sax, U., Mohammed, Y., Viezens, F. and Rienhoff, O. eds. Grid-Computing in der Biomedizinischen Forschung – Datenschutz und Datensicherheit, Urban&Vogel, München.

M. Smith, T. Friese, B. Freisleben(2006): Model Driven Development of Service-Oriented Grid Applications,Grid Computing, pp. 191-210, Vieweg Verlag, 2006

Mohammed, Y. (2006): Erweiterte Sicherheit und Datenschutz Techniken. ,in Sax, U., Mohammed, Y., Viezens, F., and Rienhoff, O. eds. Grid-Computing in der Biomedizinischen Forschung – Datenschutz und Datensicherheit, Urban&Vogel, München.

Mohammed, Y., Viezens, F., Sax, U.(2006): Privacy in Grid Computing Projects for Biomedicine – The MediGRID Project.,in Sax, U., Mohammed, Y., Viezens, F. and Rienhoff, O. eds. Grid-Computing in der biomedizinischen Forschung - Datenschutz und Datensicherheit, Urban&Vogel, München.

Mohammed, Y., Viezens, F., Sax, U., and Rienhoff, O. (2006): Rechtliche Aspekte bei Grid-Computing in der Medizin. ,in Niederlag, W., Dierks, C., Rienhoff, O. and Lemke, H.U. eds. Rechtliche Aspekte der Telemedizin.

Sax, U., Mohammed, Y., Viezens, F., Rienhoff, O.(2006): Grid-Computing in der Biomedizinischen Forschung – Datenschutz und Datensicherheit.,Medizin und Wissen Publ.Comp, München.

T. Friese, M. Smith, B. Freisleben(2006): The Service-Oriented Ad Hoc Grid,Grid Computing, pp. 143-190, Vieweg Verlag, 2006

Patente

Michael Brenner, Matthew Smith(2012): Encrypted Computing,International Patent Application (WIPO Appl. No. WO/2012/113908, Intl. Appl. No. PCT/ EP2012/053165, Intl. Filing Date 24.02.2012, IPC G06F 7/00)

Michael Brenner, Matthew Smith(2011): Verfahren und Vorrichtung zur Berechnung homomorph verschlüsselter Programme,Deutsches Patent- und Markenamt (angemeldetes Patent, amtl. Az. 10 2011 012 328.8)

Vorträge

B. Henne(2008): Future concepts of authentication and authorization in Grid computing, GridKa School 2008, Karlsruhe September 2008

C. Grimm, R. Gröper, S. Piger, C. Kunz, G. L. Volpato, W. Weisz(2008): Grid Security Tutorial, 3. D-Grid Security Workshop, Göttingen April 2008

R. Groeper, C. Grimm(2007): Aktuelle Entwicklungen zu GridShib,2. D-Grid Security Workshop, Göttingen, März 2007

R. Groeper, C. Grimm(2006): Aktuelle Entwicklungen zu GridShib,2. D-Grid VO-Management Workshop, Birlinghoven, Dezember 2006

R. Groeper, C. Grimm(2006): AA Infrastruktur: GridShib,D-Grid All Hands Meeting, Hamburg, November 2006

R. Groeper, M. Hillenbrand, C. Grimm(2006): AA Infrastruktur: Integration von VOMS in GT4 und gLite,D-Grid All Hands Meeting, Hamburg, November 2006

Projektberichte

J. Wiebelitz, M. Brenner(2008): Konzept für das Accounting im D-Grid,

J. Wiebelitz, M. Brenner(2008): DGAS als Accounting-System im D-Grid,

J. Wiebelitz, W. Müller, M. Brenner, C. Grimm, G. von Voigt(2008): Stand der Entwicklungen im Bereich Accounting für D-Grid,

P. Gietz, C. Grimm, R. Groeper, M. Haase, S. Makedanz, H. Pfeiffenberger, M. Schiffers(2007): Evaluation of international Shibboleth-based VO Management Projects,Interoperability and Integration of VO Management Technologies in D-Grid (IVOM), Work Package 1, May 2007

T. Dussa, U. Epting, B. Filipovic, G. Foest, J. Glowka, J. Götze, C. Grimm, M. Hillenbrand, C. Kohlschütter, R. Lohner, S. Makedanz, P. Müller, M. Pattloch, S. Piger, T. Straub, J. Wiebelitz(2006): Analyse von AA-Infrastrukturen in Grid-Middleware,1. Zwischenbericht D-Grid FG3-4, 72 Seiten, BMBF-Projekt, März 2006

T. Dussa, U. Epting, B. Filipovic, G. Foest, J. Glowka, J. Götze, C. Grimm, M. Hillenbrand, C. Kohlschütter, R. Lohner, S. Makedanz, P. Müller, M. Pattloch, S. Piger, T. Straub, J. Wiebelitz(2006): Use Cases for Authorization in Grid-Middleware,2. Zwischenbericht D-Grid FG3-4, 26 Seiten, BMBF-Projekt, September 2006

Technische Berichte

Michael Brenner, Jürgen Schmidt (ed.)(2013): ENISA-Empfehlungen zu Krypto-Verfahren,Heise Security online http://heise.de/-2043356

Dissertationen

Benjamin Henne(2014): Methoden zur Schaffung von Bewusstsein über persönliche Informationen als notwendige Voraussetzung für den Schutz der Privatsphäre,Dissertation, Technische Informationsbibliothek und Universitätsbibliothek Hannover file

Michael Brenner(2012): Rechnen mit verschlüsselten Programmen und Daten,Dissertation, Technische Informationsbibliothek Hannover file

M. Smith(2008): Security for Service-Oriented On-Demand Grid Computing,Dissertation, pp. 1-301, 2008 file

Studentische Arbeiten

C. Szongott(2009): Webservice-basiertes Auditing für Grid Proxy Credentials,Prüfer: C. Grimm, G. v. Voigt, Betreuer: C. Kunz, Masterarbeit, Mai 2009

Benjamin Henne(2008): Workflows und Metascheduling im Grid-Computing,Prüfer: C. Grimm, G. von Voigt, Betreuer: R. Groeper, Masterarbeit, Juni 2008 file

C. Kunz(2007): Implementierung einer Policy-basierten Autorisierung für die gLite Compute Services,Prüfer: C. Grimm, G. von Voigt, Betreuer: S. Piger, Masterarbeit, Juni 2007 file

R. Groeper(2006): Policy-based Authorization for Grid Data-Management,Prüfer: C. Grimm, G. von Voigt, Betreuer: S. Piger, Masterarbeit, Oktober 2006 file

B. Henne(2005): Aufbau eines IPSec Testnetzes mit Einsatz von PKI und OCSP,Prüfer: C. Grimm, G. von Voigt, Betreuer: D. Goehr, Bachelorarbeit, September 2005 file

R. Groeper(2004): Untersuchung von Methoden zur Synchronisierung entfernter Rechneruhren,Prüfer: C. Grimm, B. Wagner, Betreuer: S. Piger, Bachelorarbeit, April 2004

D. Goehr(2001): Bewertung der Dienstgüte von Audio- und Videodiensten,Prüfer: Hartmann (TU Braunschweig), H. Pralle, Betreuer: E. Siemens, Diplomarbeit, Oktober 2001

J. Wiebelitz(2000): Überlegungen zur Realisierung eines Firewall-Konzeptes für die Universität Hannover,Prüfer: H. Pralle, C.-E. Liedtke, Betreuer: B. Böker, Diplomarbeit, April 2000

Last Change: 13.08.2013
 
Editorial Responsibility Hinrich Tobaben